Crowds: anonymity for Web transactions
ACM Transactions on Information and System Security (TISSEC)
An investigation of geographic mapping techniques for internet hosts
Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications
Proceedings of the First International Workshop on Information Hiding
Constraint-based geolocation of internet hosts
Proceedings of the 4th ACM SIGCOMM conference on Internet measurement
GTrace - A Graphical Traceroute Tool
LISA '99 Proceedings of the 13th USENIX conference on System administration
Towards IP geolocation using delay and topology measurements
Proceedings of the 6th ACM SIGCOMM conference on Internet measurement
Tor: the second-generation onion router
SSYM'04 Proceedings of the 13th conference on USENIX Security Symposium - Volume 13
Improving the accuracy of measurement-based geographic location of Internet hosts
Computer Networks: The International Journal of Computer and Telecommunications Networking
Peering through the shroud: the effect of edge opacity on ip-based client identification
NSDI'07 Proceedings of the 4th USENIX conference on Networked systems design & implementation
Octant: a comprehensive framework for the geolocalization of internet hosts
NSDI'07 Proceedings of the 4th USENIX conference on Networked systems design & implementation
Dude, where’s that IP?: circumventing measurement-based IP geolocation
USENIX Security'10 Proceedings of the 19th USENIX conference on Security
Finding and analyzing evil cities on the internet
AIMS'11 Proceedings of the 5th international conference on Autonomous infrastructure, management, and security: managing the dynamics of networks and services
Characterizing the file hosting ecosystem: A view from the edge
Performance Evaluation
Network measurement based modeling and optimization for IP geolocation
Computer Networks: The International Journal of Computer and Telecommunications Networking
Location tracking via social networking sites
Proceedings of the 5th Annual ACM Web Science Conference
Proceedings of the 2013 workshop on New security paradigms workshop
DataTraffic Monitoring and Analysis
Hi-index | 0.00 |
Internet geolocation technology aims to determine the physical (geographic) location of Internet users and devices. It is currently proposed or in use for a wide variety of purposes, including targeted marketing, restricting digital content sales to authorized jurisdictions, and security applications such as reducing credit card fraud. This raises questions about the veracity of claims of accurate and reliable geolocation. We provide a survey of Internet geolocation technologies with an emphasis on adversarial contexts; that is, we consider how this technology performs against a knowledgeable adversary whose goal is to evade geolocation. We do so by examining first the limitations of existing techniques, and then, from this base, determining how best to evade existing geolocation techniques. We also consider two further geolocation techniques which may be of use even against adversarial targets: (1) the extraction of client IP addresses using functionality introduced in the 1.5 Java API, and (2) the collection of round-trip times using HTTP refreshes. These techniques illustrate that the seemingly straightforward technique of evading geolocation by relaying traffic through a proxy server (or network of proxy servers) is not as straightforward as many end-users might expect. We give a demonstration of this for users of the popular Tor anonymizing network.